Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 12:33

General

  • Target

    5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe

  • Size

    4.0MB

  • MD5

    5ca4b78f414036b4bf34bc8de3947318

  • SHA1

    6f3b3802691384a3c1bfa55489ca03f5541e8683

  • SHA256

    e0b17abe31aeccd2ecd31c1ff7d2276f0a27b2b04d060e7555a3c0589ff08be4

  • SHA512

    e84a9ffd5901d55b457b2d6dd03ad1bc829cdd3fb3e67b26238d94e7b4c99636f7e399d56de2f87ab970d9ef39df5a0b10af0eea4d39b0b7a811cb0f1b838e66

  • SSDEEP

    98304:o/nqPXevmgbSwFDWwuJvTx/qzaRQVbEZTubdS2NdQqVh:o/qXXwFDTuJvT0m+bEtubQ

Malware Config

Extracted

Family

darkcomet

Botnet

Renner

C2

tutoriais157.no-ip.org:1604

Mutex

DC_MUTEX-XXCP2CL

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    i2mVQTZrqSxh

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Users\Admin\AppData\Local\Temp\VIP TRI-HACK.EXE
        "C:\Users\Admin\AppData\Local\Temp\VIP TRI-HACK.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\VIP TRI-HACK.EXE
          "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\VIP TRI-HACK.EXE" -ORIGIN:"C:\Users\Admin\AppData\Local\Temp\"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\VIP TRI-HACK.EXE
            "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\VIP TRI-HACK.EXE" "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\Admin\AppData\Local\Temp\"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:2564
      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
        "C:\Windows\system32\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
          4⤵
          • Modifies firewall policy service
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\CET_Archive.dat

    Filesize

    3.0MB

    MD5

    8e3605193c41f185077b184d0ae8de37

    SHA1

    9f60c847d710bea0a1635cdc1e52640008ff0594

    SHA256

    967029fbce5238d8563591e8308afa7f2c56c024cc010a0f662ceb0f112323b7

    SHA512

    954c95f074f767ae7662e3165a55fdffaac443176db73624a8cf8bf7bd87d1d1e1d1569f9e698a8bdca0fae6716767bf78a1f90beae46a4404a99d4202ef9897

  • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\CET_TRAINER.CETRAINER

    Filesize

    15KB

    MD5

    9c973b4036c540f238a0d3f5faa09878

    SHA1

    a48dae90053866c0acf8555e6c6c10de8099e34b

    SHA256

    027cc11720d6ada16cfa9398773054650c670dc3f6ecf10aee3fe47c7e055e86

    SHA512

    d5ac8b2430448cda16e6e5ed151371cf08e18b8e05d5a38be2581cb0ed6a60bf2b9eae710f200e4d62a2d397327a518a9e2961be518e691890b96aaf4ea90cc9

  • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\defines.lua

    Filesize

    3KB

    MD5

    1c08aaed49c4c67bd2bb3a235c720348

    SHA1

    ed1dad9db0270c072e5609c8a0b676f46ecc7f3e

    SHA256

    fb36305086e4458907a73ec270523db872d58e8772f2fa58271936f6bb727440

    SHA512

    47325bf6c272047b6daa6b0555236da14ff8d52a9e3e3a5f7398a1aea175de99ee42ca5c4e34da5601e58fb0e752fba772575a7e839f207c569f64a106a78e95

  • C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\win32\dbghelp.dll

    Filesize

    1.2MB

    MD5

    4003e34416ebd25e4c115d49dc15e1a7

    SHA1

    faf95ec65cde5bd833ce610bb8523363310ec4ad

    SHA256

    c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

    SHA512

    88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

  • \Users\Admin\AppData\Local\Temp\VIP TRI-HACK.EXE

    Filesize

    3.3MB

    MD5

    bf0b08da36e54274d2e622204dde8a0d

    SHA1

    ba746792dc4355ee5de3a9b8b6a43b0e3d9c7d79

    SHA256

    c18eb190e5cc01bab2f066ba1dace4db5ca8034126c71a8936cf86d081d66cfa

    SHA512

    31f674b30e712e7a6ef82caef9a1f9431711379cc45ef8c654cdcb7a892f71fdf6d1c4257c4e318350a7a7505a11e6ca7bbae097b672f27182d4628b11caf8d6

  • \Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\VIP TRI-HACK.EXE

    Filesize

    188KB

    MD5

    00bb109abc3e80495c919241198352e6

    SHA1

    4b50b54af591836571fece5326b59456cd8264ad

    SHA256

    41f456c9bdbe7df6df63629d4bcee63ebff386d473a3cd9c2ef38bcd8e053171

    SHA512

    7fa4acfa825232cc72cb3bdbac01c0af2e61641ff62233403ed95511c436418f802aab897ae961e8a15ef460ff8b694e4996c8ab29f4552a3babb3a4995adeaf

  • \Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\VIP TRI-HACK.EXE

    Filesize

    6.4MB

    MD5

    89637453e3bf64e87334ee83b0fc3ee8

    SHA1

    6115eace9959ff8d67aec6412ac6adf19b15e213

    SHA256

    ee2fcbdf1a0b5ea1d04fc34dd0f51175b6954c721039ee60a125e961767e3201

    SHA512

    1ff1603b68c1ec26294b4d7d730ed43b1c4d82b7799be9db399a8aae9f62e089c44de0e51d2be2192191c3bec981b83a98a85dfb0f554b0521efb9ec5abf866c

  • \Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\lua5.1-32.dll

    Filesize

    322KB

    MD5

    03c7c30bdad17e233843f61d46f22542

    SHA1

    aec92289caa4b1f085e37c9945fdc25882b338bf

    SHA256

    6720db08ff6ed24f9e6c3f2912fff2512a6904bdf68b946f85ae97a643630d41

    SHA512

    005e3421adf98dd4eec9a6ea4ed7ef11a3b1372d466d7ab7fa87ebcb37202c5ac223d42c367516ea505dd919afcdde160b9c4d09ad16334238680615e06b2052

  • \Windows\SysWOW64\MSDCSC\msdcsc.exe

    Filesize

    4.0MB

    MD5

    5ca4b78f414036b4bf34bc8de3947318

    SHA1

    6f3b3802691384a3c1bfa55489ca03f5541e8683

    SHA256

    e0b17abe31aeccd2ecd31c1ff7d2276f0a27b2b04d060e7555a3c0589ff08be4

    SHA512

    e84a9ffd5901d55b457b2d6dd03ad1bc829cdd3fb3e67b26238d94e7b4c99636f7e399d56de2f87ab970d9ef39df5a0b10af0eea4d39b0b7a811cb0f1b838e66

  • memory/972-83-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/972-82-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/1192-84-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2224-17-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-2-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-4-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-16-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-7-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2224-51-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-18-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-6-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-8-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-9-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-10-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-11-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-15-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB

  • memory/2224-14-0x0000000000400000-0x00000000007FC000-memory.dmp

    Filesize

    4.0MB